<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	
	>
<channel>
	<title>
	Comments on: Wikileaks Hackers Bring Down Zimbabwe Websites	</title>
	<atom:link href="https://gregladen.com/blog/2011/01/02/wikileaks-hackers-bring-down-z/feed/" rel="self" type="application/rss+xml" />
	<link>https://gregladen.com/blog/2011/01/02/wikileaks-hackers-bring-down-z/</link>
	<description></description>
	<lastBuildDate>Tue, 10 May 2011 18:06:46 +0000</lastBuildDate>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.4.6</generator>
	<item>
		<title>
		By: betty pope		</title>
		<link>https://gregladen.com/blog/2011/01/02/wikileaks-hackers-bring-down-z/#comment-497241</link>

		<dc:creator><![CDATA[betty pope]]></dc:creator>
		<pubDate>Tue, 10 May 2011 18:06:46 +0000</pubDate>
		<guid isPermaLink="false">http://scienceblogs.com/gregladen/2011/01/02/wikileaks-hackers-bring-down-z/#comment-497241</guid>

					<description><![CDATA[http://www.tusijisunde.com/i-have-no-regrets-over-wikileaks/

]]></description>
			<content:encoded><![CDATA[<p><a href="http://www.tusijisunde.com/i-have-no-regrets-over-wikileaks/" rel="nofollow ugc">http://www.tusijisunde.com/i-have-no-regrets-over-wikileaks/</a></p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: MadScientist		</title>
		<link>https://gregladen.com/blog/2011/01/02/wikileaks-hackers-bring-down-z/#comment-497240</link>

		<dc:creator><![CDATA[MadScientist]]></dc:creator>
		<pubDate>Sun, 02 Jan 2011 21:15:53 +0000</pubDate>
		<guid isPermaLink="false">http://scienceblogs.com/gregladen/2011/01/02/wikileaks-hackers-bring-down-z/#comment-497240</guid>

					<description><![CDATA[Since they&#039;re hijacking other people&#039;s computers to do the job, their work is considered a criminal offense in many places around the world. However, the net is a very big place and it&#039;s rarely ever easy to figure out who the crooks are.

@Stacy: It&#039;s not hacking at all, it&#039;s cracking other peoples&#039; computers and using it to waste resources. Unfortunately people seem to write &#039;hacking&#039; every time even when it&#039;s clearly &#039;cracking&#039;. At any rate, the ultimate target is not what&#039;s cracked, it&#039;s the numerous zombified computers which are used for the attack.
]]></description>
			<content:encoded><![CDATA[<p>Since they&#8217;re hijacking other people&#8217;s computers to do the job, their work is considered a criminal offense in many places around the world. However, the net is a very big place and it&#8217;s rarely ever easy to figure out who the crooks are.</p>
<p>@Stacy: It&#8217;s not hacking at all, it&#8217;s cracking other peoples&#8217; computers and using it to waste resources. Unfortunately people seem to write &#8216;hacking&#8217; every time even when it&#8217;s clearly &#8216;cracking&#8217;. At any rate, the ultimate target is not what&#8217;s cracked, it&#8217;s the numerous zombified computers which are used for the attack.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Greg Laden		</title>
		<link>https://gregladen.com/blog/2011/01/02/wikileaks-hackers-bring-down-z/#comment-497239</link>

		<dc:creator><![CDATA[Greg Laden]]></dc:creator>
		<pubDate>Sun, 02 Jan 2011 19:59:21 +0000</pubDate>
		<guid isPermaLink="false">http://scienceblogs.com/gregladen/2011/01/02/wikileaks-hackers-bring-down-z/#comment-497239</guid>

					<description><![CDATA[I love the fact that their message was &quot;All your base are belong to us&quot;

If that meme happens to not have hit southern Africa, it may have required the Ministry if Intelligence and Secret Police to figure that one out. 

See:
http://sophosnews.files.wordpress.com/2010/12/zimbabwe-defacement.jpg?w=640]]></description>
			<content:encoded><![CDATA[<p>I love the fact that their message was &#8220;All your base are belong to us&#8221;</p>
<p>If that meme happens to not have hit southern Africa, it may have required the Ministry if Intelligence and Secret Police to figure that one out. </p>
<p>See:<br />
<a href="http://sophosnews.files.wordpress.com/2010/12/zimbabwe-defacement.jpg?w=640" rel="nofollow ugc">http://sophosnews.files.wordpress.com/2010/12/zimbabwe-defacement.jpg?w=640</a></p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Stephanie Z		</title>
		<link>https://gregladen.com/blog/2011/01/02/wikileaks-hackers-bring-down-z/#comment-497238</link>

		<dc:creator><![CDATA[Stephanie Z]]></dc:creator>
		<pubDate>Sun, 02 Jan 2011 17:26:53 +0000</pubDate>
		<guid isPermaLink="false">http://scienceblogs.com/gregladen/2011/01/02/wikileaks-hackers-bring-down-z/#comment-497238</guid>

					<description><![CDATA[Stacy, they also hacked the Ministry of Finance website to add a message. What it&#039;s supposed to accomplish, I&#039;m not sure, but they did break in.]]></description>
			<content:encoded><![CDATA[<p>Stacy, they also hacked the Ministry of Finance website to add a message. What it&#8217;s supposed to accomplish, I&#8217;m not sure, but they did break in.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Stacy		</title>
		<link>https://gregladen.com/blog/2011/01/02/wikileaks-hackers-bring-down-z/#comment-497237</link>

		<dc:creator><![CDATA[Stacy]]></dc:creator>
		<pubDate>Sun, 02 Jan 2011 17:12:47 +0000</pubDate>
		<guid isPermaLink="false">http://scienceblogs.com/gregladen/2011/01/02/wikileaks-hackers-bring-down-z/#comment-497237</guid>

					<description><![CDATA[From Wikipedia - &lt;i&gt; One common method of attack involves saturating the target machine with external communications requests, such that it cannot respond to legitimate traffic, or responds so slowly as to be rendered effectively unavailable.&lt;/i&gt;

I don&#039;t think I&#039;d define that as hacking.]]></description>
			<content:encoded><![CDATA[<p>From Wikipedia &#8211; <i> One common method of attack involves saturating the target machine with external communications requests, such that it cannot respond to legitimate traffic, or responds so slowly as to be rendered effectively unavailable.</i></p>
<p>I don&#8217;t think I&#8217;d define that as hacking.</p>
]]></content:encoded>
		
			</item>
	</channel>
</rss>
